A one-time security audit revealed that employees do not have the appropriate access to system resources.
The auditor is concerned with the fact that most of the accounts audited have unneeded elevated permission to
sensitive resources. Which of the following was implemented to detect this issue?
Group based privileges